Tuesday, December 31, 2019

The Value of Female Friendships

I met my girlfriend Dana in college, and in the years since then our friendship has grown exponentially. Nine years ago, Dana told me that she had breast cancer. Shes a survivor. In that timeframe, my marathon walking buddy Allison found out she had appendicidal cancer. She too is a survivor. With two very close girlfriends in the same situation—one that was certainly new to all of us—I found myself asking: How as a girlfriend do I handle this? What do I do to support them? Where do I look for answers? This is not an article about cancer. It is an article about the incredible life-force underlining the word girlfriend. Girlfriend Support I remember the moment I heard about Allisons cancer. I didnt want to talk with my husband, even though he is a great man and a caring friend of Allisons as well. I wanted to talk with my female friends. I wanted their advice, their hugs, their sincere listening while I asked ‘why? Seeking advice, sharing concern, providing support and love, I wanted to be around the women who understood how I felt and who, I hoped, would help me be a better friend to my friends going through one of lifes scariest situations. So, why are girlfriends so important? I dug in and studied my own need for female community and what pulled me toward my friendships as a primary support system in a time a great stress. I was especially curious to find out why couldnt I fill this need with my husband or through the wisdom of books, advisors or other communities? Was it just me? Turns out it wasnt. Relationship Research A little research led me to a captivating book that spelled out the answers to me. The Tending Instinct, by Shelley E. Taylor, unlocks some of the mysteries of women, men, and the biology of our relationships. The big ah-ha! I discovered in its pages is that this need for community with other women is biological; it is part of our DNA. Taylors book consolidated a variety of studies covering cultural factors, decades of research, anecdotal references—even the biological ties to the girlfriend concept in the animal kingdom. An unending stream of fascinating facts helped define why we as women are more social, more community focused, collaborative, less competitive and, above all, why we need our girlfriends. Consider these findings: Longevity - Married men live longer than single men, yet women who marry have the same life expectancy as those who dont. However, women with strong female social ties (girlfriends) live longer than those without them.Stress - For decades, stress tests focused solely on male participants, believing that all humans would respond in the same manner. When these same stress tests were finally conducted on females it was discovered that women dont have the same, classic fight or flight response to stress that men do. According to the research presented in The Tending Instinct, women under stress have the need to tend and befriend. We want to tend to our young and be with our friends. Time with our friends actually reduces our stress levels.More Stress - A study conducted by the UCLA School of Medicine found that when were with our girlfriends, our bodies emit the feel good hormone oxytocin, helping us reduce everyday stress. By prioritizing our female friendships and spending time with th ese friends, we take advantage of a very simple, natural way to reduce our stress.Even More Stress - Prairie voles, a monogamous rodent, have a similar response to stress. When a male vole is put in a stressful situation, he runs to his female partner. Female voles, when stressed, immediately run to the females they were raised with.Self-Esteem - A recent study by Dove indicated that 70% of women feel prettier because of their relationships with female friends. Its no surprise that our self-esteem is highly influenced by our girlfriends; this is important to understand for girls as well as women.The Health Factor - Women without strong social ties risk health issues equivalent to being overweight or a smoker—its that serious. Friendships Waning With all Ive discovered that is good about female friendships, I was disappointed to come across a national survey from 2006 that found a sharp decline in friendships. Research co-author Lynn Smith-Lovin, a sociologist at Duke University said, From a social point of view, it means youve got more people isolated. When were isolated, we dont have each other to help us through tough situations like hurricanes or fires, financial struggles or relationship changes, sadness or cancer. Without communities of women, we often miss opportunities to be involved in our cities, to learn from each other, to empathize with other women and to share the benefits of laughter and a heart-felt hug. As women, we sometimes need to be reminded what being a girlfriend means. Too often it takes an illness or loss to hit us with reality, realization, and appreciation of friendship. That reminder can also be as simple as a caring card, a hug or an e-mailed photo. Once in a while we simply need to take the time to think about our friends, stop and live in the moment, and if at all possible, celebrate that moment. Hear some bad news? Call a girlfriend. Have something great to celebrate? Share that celebration with a friend. Want to feel prettier, be less stressed, be healthier and happier? Spend some time with your BFFs. Like the scary, life-changing diagnoses of my dear girlfriends, recognize your own need for friendships and fill that need with time and memories together. Life is better together—with your girlfriends. NOTE: Research for this article primarily attributed to The Tending Instinct by Shelley E. Taylor. Additional information was received form Kappa Delta, NWFD facts, and the Dove Beauty study.

Sunday, December 22, 2019

Adolf Hitler s Influence On His Life - 1750 Words

Adolf Hitler was born on the 20th April 1889 in the small Austrian town of Braunau to Alois Hitler Klara Hitler. As a child Hitler was very intellectual and showed great passion for success in his education. He was popular among his peers and was often admired for his leadership qualities throughout his primary education. His father was a very dominating man, who took his anger from work problems on his family, and as Hitler progressed to his teen years he and his father often had arguments, which resulted in Hitler being beaten severely. As the years passed Hitler grew close to his mother who had a kind heart but couldn’t rebel against his father as women had no power in those days. Hitler gave up in studying hard in his secondary education due the problems with his father. His grades began to drop tremendously, which angered his father even more. He only excelled in Art Gymnastics, which was classed as ‘useless’ subjects by his father. After his father passed away when he was 14, Hitler had no strong influence to push him to continue with his studies. Later, doing horribly in his final exams, he left school with no formal education at the age of 16. At the age of 18, Hitler decided to pursue his dream of becoming an artist by trying to pass the entrance exam at the Vienna Academy of Fine Arts. Hitler was very confident that he would pass the exam, therefore the rejection from the academy came as a very big shock to him which Hitler couldn t accept. Hitler’s rejectionShow MoreRelatedHitler s Impact On The World War II1636 Words   |  7 Pagessquare, saluting and chanting Hitler s name. World War II has begun and many Germans hope for improvements in the economy. Their leader is Adolf Hitler. Adolf Hitler, dictator of Germany in World War II, was a powerful speaker who caused over 5 million deaths in concentration camps. Though Hitler s impact can be felt in modern times, the roots of his atrocious behavior began at childhoodâ₠¬â€more specifically—high school. Years before Adolf Hitler was born, Hitler s great grandfather, Johann GeorgRead MoreAdolf Hitler As A Leader Of Nazi Germany1677 Words   |  7 PagesAdolf Hitler once said â€Å"It is more difficult to fight against faith than against knowledge† (â€Å"30 Eye Catching Hitler Quotes.). In a dictatorship there is one ruler who is in charge of everything in the nation in which he/she rules. Adolf Hitler was born on April 20, 1889 in Braunau am Inn. Hitler also known as Fà ¼hrer; he was chancellor of Germany from 1933 to 1945, and served as dictator from 1934 to 1945. Adolf Hitler was the leader of Nazi Germany, he was one of the initial causes which triggeredRead MoreAdolf Hitler : Leading The Genocide1182 Words   |  5 PagesMarch 2015 Adolf Hitler: Leading the Genocide The Holocaust was the mass murder of Jews under the German Nazi regime in 1941 to 1945. There are many components of this significant event. One important component was Adolf Hitler, the leader of the Nazi Party and Chancellor of Germany from 1933 to 1945. Hitler contributed to the execution of Jews during WWII through his ideology, his dictatorship, and his leadership of the Nazi Party. To initiate, Hitler’s early life had a great impact on his ideologyRead MorePol Pot vs. Adolf Hitler Essay1237 Words   |  5 PagesThough Communist leader Pol Pot and German nationalist Adolf Hitler can be compared in several ways, there are also myriad differences between their ascendancies. The social dispositions and executions of Adolf Hitler and Pol Pot, although similar in several ways, also differed for numerous reasons during their supremacies. The social perspectives and exploits of Hitler and Pol Pot have multiple similarities. For example, both Pol Pot and Hitler advocated and, to an extent, succeeded in mass executionRead MoreHitler vs. Gandhi1721 Words   |  7 Pagessmall western Indian state of Porbandar under the name Mohandas Karamchand Gandhi (Ghandis Life) . When Gandhi was finished with high school, he entered a small Indian college, the Samaldas College at the University of Bombay (Mahatma). After beginning his education here, however, he decided he disliked and traveled to the University College London, leaving his wife and infant son (Ghandis Life). It was while attending school in London that he initially became exposed to the diversityRead MoreEssay about Profile of Adolf Hitler (1889 -1945)774 Words   |  4 Pages Profile of Adolf Hitler (1889 -1945) Family Background Adolf Hitler was born on April 20th 1889 in Braunau-am-Inn, Austria. The town is near to the Austro-German border, and his father, Alois, worked as a customs officer on the border crossing. His mother, Klara, had previously given birth to two other children by Alois, (Gustav and Ida) but they both died in their infancy. Adolf attended school from the age of six and the family lived in various villagesRead MoreColby Warzecha. College English. 2017. The Rise And Fall1739 Words   |  7 PagesRise and Fall of Adolf Hitler WWII was undoubtedly one of the world’s greatest calamities with millions of lives lost. This war impacts the world even today. No person bears more responsibility than Adolf Hitler. It is important; however, to learn and understand his life so that the world does not repeat the same mistakes as seen in the 20th century. Adolf Hitler was born on April 20, 1889 in Braunau, Austria. His father, Alois Hitler, worked as a mid-level customs official. His childhood seemedRead MoreLord Of The Flies By William Golding1271 Words   |  6 PagesAfter following in his father s footsteps and teaching English and philosophy to unruly boys at Bishop Wordsworth’s School, Golding abandoned his profession to join the Royal Navy and fight in World War II. Golding has said of the war, â€Å"I began to see what people were capable of doing. Anyone who moved through those years without understanding that man produces evil as a bee produces honey, must have been blind or wrong in the head† (â€Å"William Golding†). Written in the early 1950’s in Salisbury, EnglandRead MoreA Dystopian Society Is An Imbalance Between The Government And The People Essay1372 Words   |  6 Pages Adolf Hitler and Nazi Germany Luigi Zavala Ms. Underhill 6 HELA 21 November 2016 Thesis Statement: A dystopian society is an imbalance between the government and the people and how their choices affect the society in a bad way; Adolf Hitler’s Nazi Germany is a very good example of a dystopian society. By analyzing Nazi Germany and Hitler’s tyranny, one can notice Adolf’s changes in Germany, his impacts on people, and how the genres of literature can be taught throughRead MoreThe Greatest Leader Of Adolf Hitler1250 Words   |  5 Pagesof cruelty and inhumanity, his name is Adolf Hitler. Adolf Hitler is known as one of the most evil leaders in world history but was also the most successful leader. The achievements accomplished by Hitler makes him the most successful leader in all of world history. Before he became the man everyone knows of, he was full of failures and a very troublesome childhood. In the small Austrian town of Braunau, a boy named Adolf Hitler was born on April 20, 1889. Young Adolf was very successful throughout

Saturday, December 14, 2019

Computer support specialist Free Essays

Dad we have fixed this issue before did you not take notes. â€Å", So as I talked him through the steps again we got it working. I have chosen to become a computer support specialist. We will write a custom essay sample on Computer support specialist or any similar topic only for you Order Now Computer Support specialist Is a helpful type of Job. It can be very flexible. I got to thinking about the way things were going and wanted to start a real career. I did some research and found this Information maybe someone else could use it to help them. A computer support specialist helps all types of people with imputer problems. One can chose to help the regular Joe or a big corporation. One would be able to solve issues with the software of a computer. One could help setup a networking system to insure everything in the house is running properly. One can easily do these tasks from home if it were necessary, therefore allowing some extra flexibility. I don’t know about any of you but helping someone out is a great feeling. The expected growth prospects for this field are to be faster than most professions. Job prospects are expected to increase by around fourteen percent, since computer re more widely utilized both by businesses and Individuals. There will be a greater need for assistance by anyone that utilizes a computer. One can help the common household with a computer slow down Issue. Maybe one has gotten a virus on the computer, a computer support specialist could help to remove the virus or speed up one’s computer. The workplace could be described in different manners depending on the company. One could actually be working in a single office environment. Some workers will be required to do onsite work. There are also some that even work in heir home. Typically the single office will be divided into cubicles. You will have a computer, phone and other standard office materials. (Bureau of labor Statistics, 2010-2011) A person can expect to earn around $26,580 to $55,990 a year. These numbers will depend on ones level of education and experience in the field. It could also depend on the company one choose to work for. (Bureau of labor Statistics, 2010-2011) A person can get by with a simple certification. Some companies will do specific software training once you start working for them. Some companies will quire a bachelor degree. A person will have to receive periodic update training. As the computer systems change you will need to keep up with the new programs. (.NET online, 2011) Setting up computer networks will also change. In order to do this job there are several qualities you need to possess. You will need to be able to listen actively. It is also required that you be able to communicate on several levels. There may be several Jobs to complete you will need to be able to manage your time. You will also need to be able to teach others how to understand the process you are doing. How to cite Computer support specialist, Papers

Friday, December 6, 2019

Ethical Issues in ICT Cyber Crime

Question: Discuss about theEthical Issues in ICTfor Cyber Crime. Answer: Introduction There is no doubt that the computer has become an indispensable tool for human development, but it is more surprising how fast the information superhighway (Internet) has managed to captivate millions of fans to its different and diverse services, and Either from the well-known and requested e-mail, to shopping services on the Web, which allow a series of virtual visits in which the products that are to be acquired are selected and keep track of the objects we select (Gerdes, 2009). Thanks to all this computer technology we can make use of many of these services freely with the simple fact of connecting to the Internet, through a telephone line and a modem. Unfortunately, technology has not only been used for the benefit of man, but some unscrupulous individuals have crossed the boundaries of security and have performed illicit acts, which has generated a great concern on the part of users of this computer medium , And many of them have been given the task of finding a solution to this problem of computer crime (Graham, 2010). Throughout this research work will be able to obtain information on the different concepts that have been given by some experts in the field of Computer Crime, how to classify them, also some organizations dedicated to this subject that in few countries have been able to establish For the control of this type of crime, as well as the general vision that has been given to this problem in our country and the legal conditions in which we currently live in this area (Graham, 2010). Beyond questioning electronic fraud or computer crime, it is necessary to unravel the behavior and behavior of individuals (Halimahton Shaari, Ismail Sualman, n.d.). Know why it is so attractive for a person to join social networks. What is your motivation? What are you looking for? Why are you doing this? How do you act? What is your way of thinking? What is your world like? An individual may have different behaviors in the "real world" and in the "virtual world", which motivates this writing to generate a small orientation in the responsible use of the ICT, and especially of the information and the intimacy in the social networks (Hansson, 2008). That amount of benefits captivated the majority of frequent internet users in the world. Its growth has taken place exponentially and people, without noticing the possible consequences, provide sensitive personal information that can be used by cybercriminals. Two causes are identified for which the crimes are committed. One subjective, which is linked to culture, is the neglect of one's own information, and another objective, linked to the technical factor of security for not taking into account measures of technological protection, such as proper use of programs, firewalls (part of A system or network designed to block unauthorized access, which allows, at the same time, authorized communications), antivirus, among others (Higgins, Packard, 2004). For example, the laws of Habeas Data (6) and "Computer crimes" in Colombia (7) (Laws 1266 of 2008 and 1273 of 2009, respectively) establish the procedures for the collection, maintenance and updating of information in the plants Of information (data banks) and contemplate violations such as the impersonation, the violation of the right to privacy and the collection of information for sale. The concept of "information security" involves two fundamental terms within its definition: risks and vulnerabilities, both closely linked. The exploitation of vulnerability within a computer system brings risks of all kinds, which must be minimized (Hynson, 2012). To a residual risk that is easily detectable and controllable thanks to an adequate contingency plan. By containing delicate personal information from its users, social networks represent a perfect scenario for computer criminals thanks to the many vulnerabilities, due mainly to the Ignorance of those who use them. In the vast majority of cases, users, without measuring consequences, offer in their profiles such important data as their work history, current position, telephones, emails and even residence address (ICT, 2009). Obtained by third parties with bad intentions through the development of simple applications or supplanting identities. Likewise, spam numbers, outdated identities and other electronic frauds reach alarming levels in social networks. Social networks Social networks often allow plurality and community to be conjugated and there, perhaps, this large part of all the energy that It gives life to the human groups that make up these networks. Social networks give anony mous popularity, discriminated integration, different equality, ill-humored education, and so many more things. The strength of the group allows the individual to change, Another way, they could be difficult and generate new affective and business bonds (ICT, 2009). Basically, its operation begins when, once the technical support is set up, a group of initiators invites friends and acquaintances to join the social network; Each new member can bring with it many new members and the growth of that social network can be exponencial. The social networks have been part of an interesting phenomenon of massification among Internet users, which has made the growth of registered people is immense and It becomes practically impossible for its administrators to exercise an efficient control over the exposure of the data of many of them (Mendina, Britz, 2004). Terms and conditions in social networks is a privacy agreement that must be accepted by a user in any social network at the time of registration , Contains the rights and duties and includes aspects such as privacy, information and content to share, security, registration and security of accounts and responsibility in the handling of information. Although there are many other aspects that should be t aken into account, but Which usually are not given attention. Is that the social network allows to carry out looking for the protection of the data of all the users that include the visibility of the information and other fundamental aspects for someone concerned by its confidentiality. Risks and vulnerabilities of the social networks Vulnerabilities are weaknesses of a system Which represent a risk to its users and which allow the attacker to violate the confidentiality, integrity and availability of stored information. Most of the time these risks are measurable and mitigatable, leading to an It is also stated that it is impossible to eliminate a risk, that is why procedures are created to make them known and to avoid their materialization. Vulnerabilities can originate in any of the following aspects: Spaces or physical elements such as areas of work of the users, location of servers, wiring, etc. That the users, As people, can reveal important information many times without know ing it, even after being warned (O'Byrne, 2006). In the access keys the complexity of the combinations is essential, if there is obvious and little change this element of security will become a vulnerability. Poor programming, Because in some cases, developers are not focused on equipping their software with good security, this creates holes that can be easily exploited by malicious people. Poor infrastructure in some networks does not have adequate equipment to prevent possible attacks. In data integrity the lack of copy or redundancy can cause losses. Social networks, being a computer system like any other, have dangerous vulnerabilities due mainly to its users. It is they who are exposed to different threats and their lack of knowledge can often lead them to reveal personal information, probably collected by those who surely do not have the best intentions (O'Byrne, 2006). Social networks are, therefore, a favorable scenario for those who pretend to attempt Against the security of information of many people; In addition, users a re, in most cases, unaware of the risk they incur by openly disclosing information of wide interest to offenders, a situation that has helped proliferate such practices. That it knows that its data are exposed to the whole public. Much has been argued about the limits of the law and the application of ethics and N compliance. When a programmer takes advantage of the advantages he has over all those who do not have advanced computer skills, he is not violating any law, worse when those people have agreed to make their data available to a third party, so be it involuntarily (Taylor, 2006) .However , The question arises, is that programmer ethical? The issue goes beyond the scope of legislation and depends solely and exclusively on the conception of good and evil of each person. A practical example is the pedestrian crossing a dangerous avenue without using the pedestrian bridge located a few meters from the place. The law may protect the one who tramples him under the argument of the irresponsibility of the pedestrian by not crossing the bridge. Hypothetically, it could appear that anyone wants to take advantage of the situation by trampling his enemy when he is in a situation as described (Taylor, 2006). In theory, that person will be protected by law, but, certainly, his action was unethical in view of the intentionality of murdering his enemy. It is necessary to emphasize that it is not the instrument - in this case represented by the Social networks - the threat to the security or confidentiality of people and their data. It is the users who can qualify this instrument making it a useful and entertaining tool or a threat for the majority of the population without much interest in informatics subjects. Therefore, the application of ethics and, in general, education about good Customs becomes a transcendental element when it comes to making available to the population something as powerful and universal as social networks. It is not social networks a tool created to violate the law and commit all kinds of crimes, on the contrary, are A useful and powerful interface of interaction and entertainment that, unfortunately, some of its users have been turning into a space where it is necessary to be cautious with personal data (Townsend, 2012). The action of the users is out of the reach of the administrators of a social network, because It is virtually impossible to control each of the millions of people with active accounts. For example, ignorance among Australian users of the risks related to social networks, as well as all the opportunities they provide to protect their privacy is a worrying aspect that must be attacked to avoid the increase of illegal acts of which they themselves ar e victims. References Gerdes, L. (2009).Cyber crime. Detroit: Greenhaven Press. Graham, I. (2010).ICT. London: Evans. Grant-Adamson, A.Cyber crime. Halimahton Shaari, Ismail Sualman.Issues in media and communication. Hansson, T. (2008).Handbook of research on digital information technologies. Hershey, Pa.: Information Science Reference. Higgins, S., Packard, N. (2004).Meeting the standards in primary ICT. London: RoutledgeFalmer. Hynson, C. (2012).Cyber crime. Mankato, Minn.: Smart Apple Media. ICT. (2009). Oxford. Mendina, T., Britz, J. (2004).Information ethics in the electronic age. Jefferson, N.C.: McFarland Co. O'Byrne, S. (2006).Information communication technology. London: Letts. Taylor, J. (2006).ICT. London: David Fulton. Townsend, J. (2012).Cyber crime secrets. Mankato, MN: Amicus.